1 2/20/03 Link Security Scenarios Ali Abaye Charles Cook Norm Finn Russ Housley Marcus Leech Mahalingam Mani Bob Moskowitz Dave Nelson Antti Pietilainen.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Wi-Fi Technology ARTI J JANSARI M.E.(C.S.E.):-1ST (E.C.)
MultiNet: Connecting to Multiple IEEE Networks Using a Single Radio Ranveer Chandra, Cornell University joint work with: Victor Bahl (MSR) and Pradeep.
ZigBee & TinyOS TinyOS and ZigBee are not competitive
Wireless Testbed in Tsinghua University Fenghua Li Network Research Center of Tsinghua University AsianFI 2008.
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Overview of the SDE Protocol Presented by Ken Alonge Chair,
LinkSec Architecture Attempt 3
Steps towards an 802.1ad draft Style of specification : A recommendation Mick Seaman.
PAR for Media Converters r2IEEE interim, October, PAR for Media Converters revision 2 Norman Finn Cisco Systems.
1 Metro Ethernet Forum OAM An Update Matt Squire Hatteras Networks.
1 IEEE Media Independent Handoff Overview of services and scenarios for 3GPP2 Stefano M. Faccin Liaison officer to 3GPP2.
Bridging & Broadcast Scenarios Carlos Ribeiro CTBC Telecom.
Doc.: IEEE /1191r5 Submission November 2004 Mike Moreton, STMicroelectronicsSlide 1 AP Architecture Thoughts Mike Moreton, STMicroelectronics.
ECMP for 802.1Qxx Proposal for PAR and 5 Criteria Version 2 16 people from ECMP ad-hoc committee.
Doc.: IEEE xxx Submission May 10-14, 2004 Alan Carlton, Interdigital CommunicationsSlide 1 Defining Layer 2.5 Alan Carlton Interdigital Communications.
Doc.: IEEE /265r0 Submission June 2001 Robert F. Heile, Consultant Steve Shellhammer, Symbol Technologies Slide 1 IEEE P Working Group for.
1 Introducing the Specifications of the Metro Ethernet Forum.
1 Introducing the Specifications of the Metro Ethernet Forum.
May 2 nd, 2001, page n° 1 The Invisible Network. May 2 nd, 2001, page n° 2 List of contents Introduction The invisible network: an example Some trends.
Network Hardware and Physical Media
Shortest Path Bridging IEEE 802
Networks: Introduction 1 CS4514 Computer Networks Term B06 Professor Bob Kinicki.
Computer Networking Components Chad DuBose ~ Assignment #3 ~ LTEC
Extended Service Set (ESS) Mesh Network Daniela Maniezzo.
Module Ethernet Technology Module Ethernet Technology.
IEEE Overview Mustafa Ergen UC Berkeley
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 EN0129 PC AND NETWORK TECHNOLOGY I NETWORK LAYER AND IP Derived From CCNA Network Fundamentals.
Doc.: IEEE /243r0 Submission March 2002 James Kempf, DoCoMo LabsSlide and IP James Kempf Seamoby WG Co-chair DoCoMo Labs USA
Submission doc.: IEEE Comment #1 from WG Comment: In Section 5.2.b two examples of spectrum resource measurements are given: PER and.
Scalable Security in a Multi-Client Environment - Private VLANs Designing VLANs in Networks.
© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
1 12/18/ :21 Chapter 12Bridges1 Rivier College CS575: Advanced LANs Chapter 12: Bridges.
Connecting LANs, Backbone Networks, and Virtual LANs
Omniran ecsg 1 Introduction to OmniRAN EC SG Max Riegel (OmniRAN SG Chair)
Omniran ecsg 1 OmniRAN Introduction and Way Forward Max Riegel (OmniRAN SG Chair)
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Wide Area Wi-Fi Sam Bhoot. Wide Area Wi-Fi  Definition: Wi-Fi (Wireless Fidelity) n. – popular term for high frequency wireless local area networks operating.
Bridges Advanced Computer Networks.
6LoWPAN Extending IP to Low-Power WPAN 1 By: Shadi Janansefat CS441 Dr. Kemal Akkaya Fall 2011.
CSCI 465 D ata Communications and Networks Lecture 20 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Computer Networks Eyad Husni Elshami. Computer Network A computer network is a group of interconnected computers to share data resources ( printer, data.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
1 25\10\2010 Unit-V Connecting LANs Unit – 5 Connecting DevicesConnecting Devices Backbone NetworksBackbone Networks Virtual LANsVirtual LANs.
CS 350 Chapter-2.
NETWORKING COMPONENTS By Scott H. Bowers. HUB A hub can be easily mistaken for a switch, physically there are no defining characteristics, both have power.
Submission doc.: IEEE 11-12/0589r2 July 2012 Donald Eastlake 3rd, Huawei R&D USASlide 1 General Links Date: Authors:
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Chapter 8: Virtual LAN (VLAN)
Submission doc.: IEEE 11-12/0589r1 May 2012 Donald Eastlake 3rd, Huawei R&D USASlide 1 General Links Date: Authors:
NSH0503/01/11041 Overview Computer Network Technology By Diyurman Gea.
Jaringan Komputer Dasar Data Link Layer (2) Aurelio Rahmadian.
1 Kyung Hee University Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs.
Doc.: mes Submission 7 May 2004 Tricci SoSlide 1 Need Clarification on The Definition of ESS Mesh Prepared by Tricci So.
Chapter 3 - VLANs. VLANs Logical grouping of devices or users Configuration done at switch via software Not standardized – proprietary software from vendor.
Hierarchical Topology Design. 2 Topology Design Topology is a map of an___________ that indicates network segments, interconnection points, and user communities.
1 6/3/2003 IEEE Link Security Study Group, June 2003, Ottawa, Canada Secure Frame Format PAR: 5 Criteria.
University of Kansas Motivation Wireless networks based on the IEEE standard require lengthy layer two configuration parameters to be set SSID (Network.
1 Two Port MAC Relay Scope - Revised David W. Martin Nortel v00 IEEE May 9-13, 2005 Berlin.
1 3/13/ :25 Chapter 5Protocol Architecture1 Rivier College CS575: Advanced LANs Chapter 5: Protocol Architecture.
1 01/27/03 Scenarios. 2 01/27/03 Business Applications Scenario 1: Secure EPON – FTTH/FTTB (provider network) Scenario 2: IEEE 802 Link Security – RPR.
IEEE Std Proposed Revision Purpose, Scope & 5 Criteria.
Networking Devices.
Virtual Local Area Networks (VLANs) Part I
Robert Moskowitz ICSAlabs
Considerations on WDS Addressing Tricci So 7 May 2004 Prepared by
PON Extra Material.
CPE 401 / 601 Computer Network Systems
Security Requirements
Chapter 3 VLANs Chaffee County Academy
Presentation transcript:

1 2/20/03 Link Security Scenarios Ali Abaye Charles Cook Norm Finn Russ Housley Marcus Leech Mahalingam Mani Bob Moskowitz Dave Nelson Antti Pietilainen Allyn Romanow Dan Romascanu Dolors Sala Mick Seaman Dennis Volpano Glen Zorn

2 2/20/03 Business Scenarios

3 2/20/03 Business Applications Scenario B1: EPON Security – FTTH/FTTB (provider network) Scenario B2: IEEE 802 Link Security – 802.3ah copper (DSL) network (copper is easy to tap) – Any 802 Enterprise network (networking devices in secure locations) Scenario B3: Secure Bridged Networks – Layer 2 provider networks (networking devices are not in secure locations)

4 2/20/03 Trust Scenarios

5 2/20/03 Scenario T0: Secure Link Definition: – A single link is secured – Security mechanism addresses MAC vulnerabilities Requirements/Assumptions: – Communication is secure on the wire only – Network device must be in trusted buildings for a complete secure architecture – MACs required to support: all topologies Business Applications: – EPON scenario where ONU is inside home or business and OLT in CO building

6 2/20/03 Scenario T1: Single-hop Secure Bridged Network Definition: – Securing a bridged network by securing each link independently – Security scope is the MAC and packet is forwarded in clear to bridge level – This case is a cascade of several T0 Scenarios (each one can potentially operate with a different MAC) Requirements/Assumptions: – Still, communication is secure on the wire but not in the network devices – Network device must be in trusted buildings for a complete secure architecture – It does not effect the bridge functionality but it does require an extended (secure) MAC in every port of the bridge (infrastructure upgrade) – Links already secured by other means can continue using the existing security mechanism (examples: , , links) Business Applications: – Same as Scenario T0 – Enterprise Layer 2 networks (networking devices are in trusted buildings)

7 2/20/03 Scenario T2: Multi-hop Secure Bridged Network Definition – Securing a bridged network by transparently bridging encrypted packets – Security is only applied at the entrance of the packet (either by the end station or closebridge) or trusted points – Can use existing bridged networks to transport the secured packets Requirements/Assumptions – No security assumptions on network infrastructure – Requires a transparent secure data encryption (SDE) protocol – Needs some awareness of security in the network: Every device (case T2.1): any bridge can take the function. Simpler at bridge level but more upgrades Few devices (case T2.2): Requires a discovery protocol to replace a security-aware bridged for another security-aware bridged during topology changes – Should operate with any IEEE802 MAC Business Applications – Provider Access/MAN environments

8 2/20/03 Scenario T3: End-to-end Secure Layer 2 Communication Definition: – Security is done station to station – Network is not aware of security Requirements/Assumptions – Stations (or end system) must support security mechanism – SDE protocol must be transparent – This is a simple case of multi-hop secure bridged network

9 2/20/03 Functional Scenarios Classification of scenarios based on functionality needed: F1: Link Protection (High Priority for networks) – Addresses scenarios T0 and T1 F2: Adjacent bridge-to-bridge (High Priority) – Addresses trust scenario T2 with infrastructure T2.1 F3: Non-adjacent bridge-to-bridge (Medium/Low Priority) – Addresses trust scenario T2 with infrastructure T2.2

10 2/20/03 Business Level Requirements Theft of service To separate customers from each other Ability to keep billing records Consistency between media (smooth transition)

11 2/20/03 Objectives Select and/or specify: A transparent secure data encryption (SDE) mechanism (high priority) A link protection mechanism for networks if added functionality is needed in 1. (high priority) A discovery protocol (low priority)